Biblio

Export 21387 results:
2011
Gorman, Siobhan, and Julian E. Barnes. "Cyber Combat: Act of War ." The Wall Street Journal (2011).
Halder, Debarati, and K. Jaishankar. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations. Information Science Reference, 2011.
Láng, Judit. "Cyber Defence after Lisbon and the Implications of NATO’s New Strategic Concept." Information & Security: An International Journal 26, no. 1 (2011): 7-11.
Schmitt, Michael N.. "Cyber operations and the Jus Ad Bellum revisited." Villanova Law Review 3 (2011): 569-605.
Schmitt, Michael N.. "Cyber Operations and the Jus Ad Bellum Revisited." Villanova Law Review 56, no. 3 (2011): 569-605.
Phahlamohlaka, Jackie, Joey Jansen Van Vuuren, and A. C. Coetzee. Cyber Security Awareness Toolkit for National Security: An Approach to South Africa’s Cyber Security Policy Implementation., 2011.
Cyber Security in the UK In Postnote. Houses of Parliament Parliamentary Office of Science and Technology, 2011.
Ashenden, Debi. "Cyber Security: Time for Engagement and Debate." In European Conference on Information Warfare and Security., 2011.
Androulidakis, Iosif. Cybercrime in Fixed Telephony Systems In Seminar 62/2011, High Tech & Cyber Crime. Brdo near Kranj, Slovenia: European Police College (CEPOL), 2011.
Cybercrime situation report In Joint Project on Regional Cooperation against Cybercrime. CyberCrime@IPA - EU/COE, 2011.
Minchev, Zlatogor. Cybersecurity and cyberdefence – elements of smart defence in 21st Century In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.
Lewis, James A., and Katrina Timlin. Cybersecurity and Cyberwarfare Preliminary Assessment of National Doctrine and Organization. Washington, D.C.: Center for strategic and international studies, 2011.
Editorial. "Cybersecurity Challenges and Responses." Information & Security: An International Journal 26, no. 1 (2011): 5-6.
Macaulay, Tyson. Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS. Boston, MA: Auerbach Publications, 2011.
Cybersecurity Strategy for Germany. Federal Ministry of the Interior, 2011.
Dubov, Dmytro V., and Mykola A. Ozgevan. Cybersecurity: the World Tendencies and Challenge for Ukraine. NІSR, 2011.
Betz, David J., and Tim Stevens. Cyberspace and the State: Toward a Strategy for Cyber-Power. New York: Routledge, 2011.
Goel, Sanjay. "Cyberwarfare: Connecting the Dots in Cyber Intelligence." Communications of the ACM 54, no. 8 (2011): 132-140.
CyberWinter 2011 Exercise. Sofia: Ministry of Transport, Information Technologies and Communications, 2011.
Lefebvre, Stephane. "The Czech Experience With Intelligence Reforms, 1993–2010." International Journal of Intelligence and CounterIntelligence 24, no. 4 (2011).
Mandel, Robert. Dark Logic: Transnational Criminal Tactics and Global Security In Stanford Security Studies., 2011.
Kim, Cheonshik, Dongkyoo Shin, and Dongil Shin. Data Hiding in a Halftone Image Using Hamming Code (15, 11) In Intelligent Information and Database Systems. ACIIDS 2011. Lecture Notes in Computer Science. Vol. 6592. Berlin, Heidelberg: Springer, 2011.
Namestnikov, Yury. DDos Attack in Q2 of 2011 In Securelist., 2011.
van Houtum, R. De rol van de internationale gemeenschap in Kosovo., 2011.
Dwyer, Johnny. "The DEA’s Terrorist Hunters: Overreaching Their Authority." Time (2011).

Pages